Abstract is missing.
- Active Defense Against Social Engineering: The Case for Human Language TechnologyAdam Dalton 0001, Ehsan Aghaei, Ehab Al-Shaer, Archna Bhatia, Esteban Castillo, Zhuo Cheng, Sreekar Dhaduvai, Qi Duan, Bryanna Hebenstreit, Md. Mazharul Islam, Younes Karimi, Amir Masoumzadeh, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr. 1-8 [doi]
- Adaptation of a Lexical Organization for Social Engineering Detection and Response GenerationArchna Bhatia, Adam Dalton 0001, Brodie Mather, Sashank Santhanam, Samira Shaikh, Alan Zemel, Tomek Strzalkowski, Bonnie J. Dorr. 9-14 [doi]
- Analysis of Online Conversations to Detect Cyberpredators Using Recurrent Neural NetworksJinhwa Kim, Yoon Jo Kim, Mitra Behzadi, Ian G. Harris. 15-20 [doi]
- A Privacy Preserving Data Publishing Middleware for Unstructured, Textual Social Media DataPrasadi Abeywardana, Uthayasanker Thayasivam. 21-28 [doi]
- Information Space DashboardTheresa Krumbiegel, Albert Pritzkau, Hans-Christian Schmitz. 29-34 [doi]
- Is this hotel review truthful or deceptive? A platform for disinformation detection through computational stylometryAntonio Pascucci, Raffaele Manna, Ciro Caterino, Vincenzo Masucci, Johanna Monti. 35-40 [doi]
- Corpus Development for Studying Online Disinformation Campaign: A Narrative + Stance ApproachMack Blackburn, Ning Yu, John Berrie, Brian Gordon, David Longfellow, William Tirrell, Mark Williams. 41-47 [doi]
- Email Threat Detection Using Distinct Neural Network ApproachesEsteban Castillo, Sreekar Dhaduvai, Peng Liu, Kartik-Singh Thakur, Adam Dalton 0001, Tomek Strzalkowski. 48-55 [doi]